CN113300844B - 一种公私角色固定的非对称密钥设置方法 - Google Patents

一种公私角色固定的非对称密钥设置方法 Download PDF

Info

Publication number
CN113300844B
CN113300844B CN202110399039.5A CN202110399039A CN113300844B CN 113300844 B CN113300844 B CN 113300844B CN 202110399039 A CN202110399039 A CN 202110399039A CN 113300844 B CN113300844 B CN 113300844B
Authority
CN
China
Prior art keywords
key
bits
plaintext
public
private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110399039.5A
Other languages
English (en)
Other versions
CN113300844A (zh
Inventor
陆成刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN202110399039.5A priority Critical patent/CN113300844B/zh
Publication of CN113300844A publication Critical patent/CN113300844A/zh
Application granted granted Critical
Publication of CN113300844B publication Critical patent/CN113300844B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

一种公私角色固定的非对称密钥设置方法,包括以下步骤:步骤一,针对十进制整数形式的明文作加密,设定系统的明文处理规格为2k+1位,k是正整数,明文处理一次只能处理2k+1位,位数是奇数;步骤二,选定一个大整数t;步骤三,利用式子因式分解,令私钥V=10t+1,公钥
Figure DDA0003019617600000011
步骤四,加解密算法,分以下两类:4.1)、公钥加密,私钥解密;4.2)、私钥签名,公钥验证。本发明提供了一种计算量轻量级且安全性良好的公私角色固定的非对称密钥设置方法。

Description

一种公私角色固定的非对称密钥设置方法
技术领域
本发明属于加密领域,涉及一种非对称密钥设置方法。
背景技术
非对称密码体制又称公私钥密码系统,跟传统的对称密码体制的区别是有一对不同的密钥,一个用于加密,另外一个用于解密,而对称密钥系统的加密、解密都是同一个密钥。相对于对称密钥需要一条安全的密钥信道,非对称密钥系统不需要专门传输密钥的安全信道,它的密钥可以在网络上公开传输,并不“忌讳”第三方获取或泄漏。业内把非对称密钥的一个经网络公开传输的密钥称为公钥,而用户存储于本地的不需要传输的密钥称为私钥。并且对非对称密钥的一对密钥来说,哪一个做公钥、哪一个做私钥,并无硬性的规定,可以任意取一个做公钥,则剩下的一个做私钥。例如,两个经典的非对称密钥方法RSA和椭圆密码都有这个特点。
传统的RSA方法,在加密、解密运算上涉及到大数模余和方幂运算,故在计算量上是重量级的。
发明内容
为了克服已有非对称密钥方法的计算量较大的不足,本发明提供了一种计算量轻量级且安全性良好的公私角色固定的非对称密钥设置方法。
本发明解决其技术问题所采用的技术方案是:
一种公私角色固定的非对称密钥设置方法,包括以下步骤:
步骤一,针对十进制整数形式的明文作加密,设定系统的明文处理规格为2k+1位,k是正整数,明文处理一次只能处理2k+1位,位数是奇数;
步骤二,选定一个大整数t;
步骤三,利用式子因式分解
Figure BDA0003019617580000021
令私钥V=10t+1,公钥
Figure BDA0003019617580000022
步骤四,加解密算法,分以下两类:
4.1)、公钥加密,私钥解密,过程如下:
4.1.1)对于2k+1位十进制明文x1x2...x2k+1,其中xj为0,1,2,…,9的数字,j=1,2,…,2k+1,公钥加密就是使用明文和公钥作十进制乘法,取结果的后2k+1位作为密文y1y2...y2k+1,如下式:
Figure BDA0003019617580000023
符号
Figure BDA0003019617580000024
表示这个乘法不是普通的乘法,是删去前面位数取最后2k+1位的乘法;
4.1.2)私钥解密就是使用密文y1y2...y2k+1与私钥作十进制乘法,并取结果的后2k+1位,所得后2k+1位为明文x1x2...x2k+1,如下式
Figure BDA0003019617580000025
4.2)、私钥签名,公钥验证,过程如下:
4.2.1)对于2k+1位十进制明文摘要x1x2...x2k+1使用私钥签名,得到签名y1y2...y2k+1
Figure BDA0003019617580000026
4.2.2)公众使用公钥对签名进行验证得到明文摘要x1x2...x2k+1,如下
Figure BDA0003019617580000031
本发明的非对称密码设置方法,它的一对密钥的公私角色是固定的,即一个必须作为公钥,另外一个则必须是私钥;其次,和传统的RSA方法相比,在加密、解密运算上本案因不涉及到大数模余(只用到一次性的大数乘法)、也不涉及到方幂运算,故比较而言在计算量上是极轻量级的;而关于加密算法的强度,由于本发明也跟RSA算法类似主要依赖于大数的因式分解,因而认为本发明的非对称密钥系统也是算法安全的。
本发明的有益效果主要表现在:计算量轻量级且安全性良好。
附图说明
图1是公私角色固定的非对称密钥设置方法的流程图。
具体实施方式
下面结合附图对本发明作进一步描述。
参照图1,一种公私角色固定的非对称密钥设置方法,包括以下步骤:
步骤一,和RSA算法一样,针对十进制整数形式的明文作加密,设定系统的明文处理规格为2k+1位,k是正整数,明文处理一次只能处理2k+1位,位数是奇数,比如k=8,每块明文就是17位十进制整数;
步骤二,选定一个大整数t。例如t为150位的大数,10149<t<10150
步骤三,利用式子因式分解
Figure BDA0003019617580000041
令私钥V=10t+1,公钥
Figure BDA0003019617580000042
步骤四,加解密算法,分以下两类:
4.1)、公钥加密,私钥解密,过程如下:
4.1.1)对于2k+1位十进制明文x1x2...x2k+1,其中xj为0,1,2,…,9的数字,j=1,2,…,2k+1,公钥加密就是使用明文和公钥作十进制乘法,取结果的后2k+1位作为密文y1y2...y2k+1,如下式:
Figure BDA0003019617580000043
符号
Figure BDA0003019617580000044
表示这个乘法不是普通的乘法,是删去前面位数取最后2k+1位的乘法;
4.1.2)私钥解密就是使用密文y1y2...y2k+1与私钥作十进制乘法,并取结果的后2k+1位,所得后2k+1位为明文x1x2...x2k+1,如下式
Figure BDA0003019617580000045
4.2)、私钥签名,公钥验证,过程如下:
4.2.1)对于2k+1位十进制明文摘要x1x2...x2k+1使用私钥签名,得到签名y1y2...y2k+1
Figure BDA0003019617580000046
4.2.2)公众使用公钥对签名进行验证得到明文摘要x1x2...x2k+1,如下
Figure BDA0003019617580000047
本实施例的密钥的公私角色是固定的,公开的始终是公钥
Figure BDA0003019617580000051
而私钥V=10t+1无论在加解密还是签名运用时都是只在本地使用,不经过任何网络传输(因为从私钥V=10t+1很容易得到t)。那么第三方对于
Figure BDA0003019617580000052
只要猜出大整数t就可以破解这个密码系统了,下面分析破解的难度,如下:
Figure BDA0003019617580000053
以上每一项都是正数,所以U必是大于首项[(10t)2k-(10t)2k-1]的数,而首项[(10t)2k-(10t)2k-1]=(10t)2k-1(10t-1)>(10t)2k-1,可见U是大于(10t)2k-1。(10t)2k-1是一个2250位的大数(150*15=2250);其次再查验从U中分析出t的困难程度,因为如果知道了t,那么密码系统也就破解了。
从[(10t)2k-(10t)2k-1]+[(10t)2k-2-(10t)2k-3]+...+[(10t)2-(10t))]=U-1中分析,U-1为已知的大数,k也是已知的,上式就是求整系数一元高次方程的整数解;因此对U-1进行因式分解,由于t为150位数,所以用小于10150但大于10149的9×10149个数去试试能否整除U-1,假设“猜”到了一个待选数t'能整除U-1,将上面式子两边除掉10t',之后
Figure BDA0003019617580000054
依旧是一个大数(位数为2250-150=2100);此时上式子变为
Figure BDA0003019617580000055
假设“猜”中了t=t'那么上式子其实就是
Figure BDA0003019617580000056
为进一步验证t=t',必须考虑
Figure BDA0003019617580000061
Figure BDA0003019617580000062
的因式分解同样需要试到9×10149个150位的数。如此进行下去,一直到首项次数由2k降到1次为止,这样一共试了16×9×10149个数的整除,并且这还是假设t=t'被猜中的情况下,否则还要多次返回重新猜;而单单试着作10149次整除,让世界上最快的京速级计算机来演算也需要耗用整个宇宙寿命的几十亿年的时间,因此,破解的难度非常大。
实例:爱丽丝和鲍勃在不安全的通信信道进行消息传输,爱丽丝需要发送一段消息给鲍勃。首先鲍勃使用大数t,基于17位长的规格,依照上述方法生成两个密钥,一个私钥V=10t+1,一个公钥
Figure BDA0003019617580000063
它们分别是一串数字。通过该不安全信道,鲍勃把公钥
Figure BDA0003019617580000064
发给爱丽丝。爱丽丝首先将发送的消息的文本编码(例如UNICODE码)转成十进制数,每取17位数进行公钥加密(所取17位数与公钥作乘法,并取末尾17位作密文)透过该信道发送给鲍勃,进行若干次加密、发送后,鲍勃收到全部密文。鲍勃对密文每17位进行解密(该17位密文数字与私钥作乘法,并取后17位),等到所有密文解密后再转成文本编码。这样爱丽丝通过不安全的信道把消息安全地传输给了鲍勃。
本说明书的实施例所述的内容仅仅是对发明构思的实现形式的列举,仅作说明用途。本发明的保护范围不应当被视为仅限于本实施例所陈述的具体形式,本发明的保护范围也及于本领域的普通技术人员根据本发明构思所能想到的等同技术手段。

Claims (1)

1.一种公私角色固定的非对称密钥设置方法,其特征在于,所述方法包括以下步骤:
步骤一,针对十进制整数形式的明文作加密,设定系统的明文处理规格为2k+1位,k是正整数,明文处理一次只能处理2k+1位,位数是奇数;
步骤二,选定一个大整数t;
步骤三,利用式子因式分解
Figure FDA0003019617570000011
令私钥V=10t+1,公钥
Figure FDA0003019617570000012
步骤四,加解密算法,分以下两类:
4.1)、公钥加密,私钥解密,过程如下:
4.1.1)对于2k+1位十进制明文x1x2...x2k+1,其中xj为0,1,2,…,9的数字,j=1,2,…,2k+1,公钥加密就是使用明文和公钥作十进制乘法,取结果的后2k+1位作为密文y1y2...y2k+1,如下式:
Figure FDA0003019617570000013
符号
Figure FDA0003019617570000014
表示这个乘法不是普通的乘法,是删去前面位数取最后2k+1位的乘法;
4.1.2)私钥解密就是使用密文y1y2...y2k+1与私钥作十进制乘法,并取结果的后2k+1位,所得后2k+1位为明文x1x2...x2k+1,如下式
Figure FDA0003019617570000015
4.2)、私钥签名,公钥验证,过程如下:
4.2.1)对于2k+1位十进制明文摘要x1x2...x2k+1使用私钥签名,得到签名y1y2...y2k+1
Figure FDA0003019617570000016
4.2.2)公众使用公钥对签名进行验证得到明文摘要x1x2...x2k+1,如下
Figure FDA0003019617570000017
CN202110399039.5A 2021-04-14 2021-04-14 一种公私角色固定的非对称密钥设置方法 Active CN113300844B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110399039.5A CN113300844B (zh) 2021-04-14 2021-04-14 一种公私角色固定的非对称密钥设置方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110399039.5A CN113300844B (zh) 2021-04-14 2021-04-14 一种公私角色固定的非对称密钥设置方法

Publications (2)

Publication Number Publication Date
CN113300844A CN113300844A (zh) 2021-08-24
CN113300844B true CN113300844B (zh) 2022-06-17

Family

ID=77319696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110399039.5A Active CN113300844B (zh) 2021-04-14 2021-04-14 一种公私角色固定的非对称密钥设置方法

Country Status (1)

Country Link
CN (1) CN113300844B (zh)

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1193538C (zh) * 2001-12-17 2005-03-16 北京兆日科技有限责任公司 电子密码形成与核验方法
CN103427987B (zh) * 2012-05-25 2016-05-18 纬创资通股份有限公司 数据加密的方法、数据验证方法及电子装置

Also Published As

Publication number Publication date
CN113300844A (zh) 2021-08-24

Similar Documents

Publication Publication Date Title
Thabit et al. A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions
Barakat et al. An introduction to cryptography
KR100259179B1 (ko) 암호화 통신 처리
WO2001030020A1 (fr) Systeme de cryptage de cle a longueur variable
CN109474425B (zh) 一种基于多个共享密钥获得任意指定长度派生密钥的方法
CN109450615A (zh) 一种高效的opc ua客户端与服务器端数据传输加密方法
EP3494663A1 (en) Methods and systems for enhanced data-centric encryption systems using geometric algebra
CN109344627B (zh) 一种新型香农完美保密方法
WO2009115824A1 (en) Encryption method
Zhao DES-Co-RSA: a hybrid encryption algorithm based on DES and RSA
CN109756335A (zh) 一种阶为梅森素数的有限域乘法群的公钥加密解密方法
CN107846422A (zh) 一种网关的配置文件加密压缩和解密解压缩的方法
CN108599941A (zh) 随机非对称扩充字节通信数据加密方法
CN102064938B (zh) 一种基于多变量与不确定性的公钥加密方法
US20060251248A1 (en) Public key cryptographic methods and systems with preprocessing
CN113300844B (zh) 一种公私角色固定的非对称密钥设置方法
CN107483206B (zh) 一种快速的量子安全的非对称加密方法
Kumar et al. Hybridization of Cryptography for Security of Cloud Data
US20130058483A1 (en) Public key cryptosystem and technique
Schaefer An introduction to cryptography and Cryptanalysis
US20080019508A1 (en) Public key cryptographic methods and systems with rebalancing
CN112367159B (zh) 一种面向医疗数据安全存储的混合加、解密方法及系统
Paar Applied cryptography and data security
CN109409106B (zh) 一种新型无穷字母表的香农完美保密方法
Rushdi et al. A pedagogical multi-key multi-stage package to secure communication channels

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20210824

Assignee: Hangzhou Yuxuansheng Lighting Technology Co.,Ltd.

Assignor: JIANG University OF TECHNOLOGY

Contract record no.: X2022330000929

Denomination of invention: An Asymmetric Key Setting Method with Fixed Public and Private Roles

Granted publication date: 20220617

License type: Common License

Record date: 20221229

Application publication date: 20210824

Assignee: Lingqi Internet of Things Technology (Hangzhou) Co.,Ltd.

Assignor: JIANG University OF TECHNOLOGY

Contract record no.: X2022330000931

Denomination of invention: An Asymmetric Key Setting Method with Fixed Public and Private Roles

Granted publication date: 20220617

License type: Common License

Record date: 20221229

Application publication date: 20210824

Assignee: Hangzhou Hibiscus Information Technology Co.,Ltd.

Assignor: JIANG University OF TECHNOLOGY

Contract record no.: X2022330000902

Denomination of invention: An Asymmetric Key Setting Method with Fixed Public and Private Roles

Granted publication date: 20220617

License type: Common License

Record date: 20221228

Application publication date: 20210824

Assignee: Zhejiang Yu'an Information Technology Co.,Ltd.

Assignor: JIANG University OF TECHNOLOGY

Contract record no.: X2022330000897

Denomination of invention: An Asymmetric Key Setting Method with Fixed Public and Private Roles

Granted publication date: 20220617

License type: Common License

Record date: 20221228

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20210824

Assignee: Taizhou Linhai Xinxing Safety Technology Training Co.,Ltd.

Assignor: JIANG University OF TECHNOLOGY

Contract record no.: X2023980047386

Denomination of invention: A method for setting asymmetric keys with fixed public and private roles

Granted publication date: 20220617

License type: Common License

Record date: 20231117

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20210824

Assignee: Hangzhou Yizheng Technology Co.,Ltd.

Assignor: JIANG University OF TECHNOLOGY

Contract record no.: X2023980054807

Denomination of invention: A method for setting asymmetric keys with fixed public and private roles

Granted publication date: 20220617

License type: Common License

Record date: 20240102

Application publication date: 20210824

Assignee: Hangzhou Tianyin Computer System Engineering Co.,Ltd.

Assignor: JIANG University OF TECHNOLOGY

Contract record no.: X2023980054814

Denomination of invention: A method for setting asymmetric keys with fixed public and private roles

Granted publication date: 20220617

License type: Common License

Record date: 20240102

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20210824

Assignee: HANGZHOU YONGGUAN NETWORK TECHNOLOGY CO.,LTD.

Assignor: JIANG University OF TECHNOLOGY

Contract record no.: X2024980000361

Denomination of invention: A method for setting asymmetric keys with fixed public and private roles

Granted publication date: 20220617

License type: Common License

Record date: 20240109